Xuehu Yan

ORCID: 0000-0001-6388-1720
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Cryptography and Data Security
  • Advanced Image and Video Retrieval Techniques
  • Digital Media Forensic Detection
  • QR Code Applications and Technologies
  • Biometric Identification and Security
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Data Compression Techniques
  • User Authentication and Security Systems
  • Computer Graphics and Visualization Techniques
  • Face recognition and analysis
  • Internet Traffic Analysis and Secure E-voting
  • Adversarial Robustness in Machine Learning
  • Advanced Malware Detection Techniques
  • DNA and Biological Computing
  • Music and Audio Processing
  • graph theory and CDMA systems
  • Advanced Image Fusion Techniques
  • Cellular Automata and Applications
  • Anomaly Detection Techniques and Applications
  • Digital Rights Management and Security
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Visual Attention and Saliency Detection

National University of Defense Technology
2017-2025

Anhui University
2021-2024

PLA Electronic Engineering Institute
2015-2019

Guilin University of Electronic Technology
2018

ORCID
2018

Harbin Institute of Technology
2007-2015

10.1007/s11554-015-0540-4 article EN Journal of Real-Time Image Processing 2015-10-27

In reversible image secret sharing (RISS), the cover can be recovered to some degree, and a share comprehensible rather than noise-like. Reversible images play an important role in law enforcement medical diagnosis. The not only reduce suspicion of attackers but also improve management efficiency shares. this paper, we first provide formal definition RISS. Then, propose RISS algorithm for (k, n)-threshold based on principle Chinese remainder theorem-based ISS (CRTISS). proposed RISS, is...

10.1109/tifs.2020.3001735 article EN cc-by IEEE Transactions on Information Forensics and Security 2020-01-01

Because of the importance digital images and their extensive application to watermarking, block chain, access control, identity authentication, distributive storage in cloud so on, image secret sharing (ISS) is attracting ever-increasing attention. Share authentication an important issue its practical application. However, most ISS schemes with share ability require a dealer participate (namely, participatory authentication). In this paper, we design for <inline-formula...

10.1109/tcsvt.2020.3025527 article EN cc-by-nc-nd IEEE Transactions on Circuits and Systems for Video Technology 2020-09-21

The network intrusion detection system (NIDS) plays a crucial role as security measure in addressing the increasing number of threats. majority current research relies on feature-ready datasets that heavily depend feature engineering. Conversely, complexity traffic and ongoing evolution attack techniques lead to diminishing distinction between benign malicious behaviors. In this paper, we propose novel end-to-end framework based contrastive learning approach. We design hierarchical...

10.3390/s24072122 article EN cc-by Sensors 2024-03-26

The high demands on datasets and computing resources in deep learning make the models vulnerable to a range of security threats such as backdoor learning. study also helps improve understanding model security. In order ensure attack effect, triggers targets existing methods are usually fixed single, so single defense will lead failure attack. This paper proposes an invisible scheme transform domain with flexible targets. By adding different offsets frequencies domain, multiple controlled....

10.3390/electronics14010196 article EN Electronics 2025-01-05

10.1016/j.image.2018.11.002 article EN Signal Processing Image Communication 2018-11-10

Human identification via multibiometrics is a very promising approach to improve overall systems security and recognition performance. In this paper, novel fusion strategy based on dual iris, visible thermal face traits proposed. Firstly, 1D Log-Gabor iris codes are fused into serial feature vector address the noisy problems of iris. Then, Complex Gabor Jet Descriptor (CGJD) proposed enhance representation abilities for images. Finally, score level algorithm Aczél-Alsina triangular norm (AA...

10.1109/isbast.2013.38 article EN International Symposium on Biometrics and Security Technologies 2013-07-01

Thien-and-Lin’s polynomial-based secret image sharing (PSIS) is utilized as the basic method to achieve PSISs with better performances, such meaningful shares, two-in-one property and shares different priorities. However, this (k,n) threshold PSIS cannot lossless recovery for pixel values more than 250. Furthermore, current solutions have several natural drawbacks, large computational costs random expansion. In paper, a efficient scheme reduced shadow size presented. For efficiency, two...

10.3390/sym10070249 article EN Symmetry 2018-07-01

Steganography is to hide secret information in a normal cover, so that the cannot be detected. With rapid development of steganography, it's more and difficult detect. Steganalysis counter steganography. In order improve detection effect, complex high-dimensional features are proposed for steganalysis. However, this also creates huge redundancy features, which turn consume generous time. Feature selection technique can effectively remove redundant features. paper, we propose new blind image...

10.1109/access.2019.2963084 article EN cc-by IEEE Access 2019-12-30

In this paper, homomorphic visual cryptographic scheme (HVCS) is proposed. The proposed HVCS inherits the good features of traditional VCS, such as, loss-tolerant (e.g., (k, n) threshold) and simply reconstructed method, where method means that decryption secret image based on human system (HVS) without any computation. addition, can support signal processing in encrypted domain (SPED), e.g., operations authentication, which protect user's privacy as well improve security some applications,...

10.4018/ijdcf.2017040105 article EN International Journal of Digital Crime and Forensics 2017-03-06

Secret image sharing (SIS) is an important technique for protection. Several shadows are produced in SIS through scrambling pixel values and their correlations of a secret image. We can own sufficient to retrieve the Meaningful shadow will increase management efficiency as well decrease encryption suspiciousness. More importantly, it may be applied encrypted domain searching, which useful distributed storage cloud computing. Hence, meaningful save labor reduce energy consumption. In this...

10.1109/access.2018.2865421 article EN cc-by-nc-nd IEEE Access 2018-01-01

The (k, n)-threshold secret image sharing scheme is an protection method, whose security comes partly from precise mathematical calculations, and even a little change in shadow images will lead to false recovered image. Thus, it crucial recover the information presence of possible noise on images, which has rarely been considered previous work. In this paper, robust polynomial-based scheme(RPSIS) against proposed, depends randomness phase without any other techniques, such as steganography....

10.1109/access.2021.3056893 article EN cc-by IEEE Access 2021-01-01

A secret image is split into <?TeX $n$?> shares in the generation phase of sharing (SIS) for a $(k,n)$?> threshold. In recovery phase, recovered when any $k$?> or more are collected, and each collected share generally assumed to be lossless conventional SIS during storage transmission. However, noise will arise real-world transmission; thus, experience data loss, which also lead loss being recovered. Secret case lossy an important issue that must addressed practice, overall subject this...

10.1145/3419750 article EN ACM Transactions on Multimedia Computing Communications and Applications 2021-02-28

Secret image sharing (SIS), as one of the applications information theory in security protection, has been widely used many areas, such blockchain, identity authentication and distributed cloud storage. In traditional secret schemes, noise-like shadows introduce difficulties into shadow management increase risk attacks. Meaningful is thus proposed to solve these problems. Previous meaningful SIS schemes have employed steganography hide shares cover images, their covers are always binary...

10.3390/e24030340 article EN cc-by Entropy 2022-02-26

10.1016/j.jvcir.2014.11.003 article EN Journal of Visual Communication and Image Representation 2014-11-17
Coming Soon ...